Skip to content

ArcServe Panel - Detect

ID: arcserve-panel

Severity: info

Author: DhiyaneshDk

Tags: panel,login,arcserve,detect

id: arcserve-panel
info:
name: ArcServe Panel - Detect
author: DhiyaneshDk
severity: info
reference:
- https://twitter.com/HunterMapping/status/1674267368359444480
- https://github.com/mdsecactivebreach/CVE-2023-26258-ArcServe
classification:
cpe: cpe:2.3:a:arcserve:udp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: arcserve
product: udp
shodan-query:
- http.favicon.hash:-1889244460
- http.favicon.hash:"-1889244460"
fofa-query: icon_hash="-1889244460"
tags: panel,login,arcserve,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Arcserve UDP"
- "/arcserve.js"
condition: or
- type: status
status:
- 200
# digest: 490a0046304402206b69cb542da4a9e819d25c793016af52bf509b2225269af13421814ccbe66c59022023ca6753c89c56b13048e91cd2e834534b705a07d6509765310ebc591758216f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/arcserve-panel.yaml"

View on Github